Symantec Endpoint Protection
Score 93.19%
Buy NowHow are TSA Scores determined?
The Software Authority strives to be different! Our results are based on factual data and you will never see a non-certified product that you never heard of being rated highly for the sole purpose of pushing sales like we often see on other review sites.
With increasing computer processor speeds being able to handle heavy workloads and improving performance significantly, TSA Scores are focused more on how well a security product protects your system from malware, viruses, and threats as opposed to how much system impact does this security product have. Reality is, if you obtain a nasty Ransomware virus as an example, does having a product that uses limited computer resources matter if you can no longer access your computer?
The TSA Score is determined by analyzing the latest review data from multiple independent testing laboratories, other reputable third party review sites and our many years of experience in the security software industry. The results from these sources are then inputted into a proprietary formula that determines the final TSA Score.
Independent Lab Results
Description
Symantec Endpoint Protection
Artificial intelligence fused with critical endpoint technologies deliver the most complete endpoint security on the planet.
Stronger, faster, lighter
Symantec Endpoint Protection 14 reduces bandwidth usage and definition file sizes by 70 percent over previous versions.
Our proprietary real-time cloud lookup enables faster scanning times.
Supports machine learning, exploit prevention, Endpoint Detection and Response (EDR), and antimalware, from one single agent.
Reduce total cost of ownership and IT resources via automated updates.
Respond and protect at scale
Integrates seamlessly with Symantec Blue Coat ProxySG web gateway and other security controls via programmable APIs to respond smartly at the endpoint.
See and manage all your endpoints from a single high-performance agent and management console for Windows, Mac, Linux, virtual machines, and embedded systems.
Ensure the most current protection with self-updating endpoint agents and extended LiveUpdate Administrator capabilities to support security patching.
175 million endpoints at your service
Symantec’s global intelligence network of 175 million endpoints and our advanced machine learning technologies allow you to detect threats more accurately.
Advanced machine learning done right: Stop unknown threats with advanced machine learning AI to deliver maximum protection at the endpoint with minimal false positives.
Wrap your endpoints in multi-layered protection—artificial intelligence in the cloud, combined with critical endpoint technologies creates the most threat-resistant endpoint security in the world.
Block zero-day attacks that prey on memory-based vulnerabilities in many popular applications with memory exploit mitigation.
Integrated cyber defense stops tomorrow’s advanced threats as well as today’s
Every endpoint is a launch pad for a cyber attack, no matter how it touches your network. Our multi-layered endpoint protection provides everything from file reputation and behavioral analysis to advanced machine learning AI. And Symantec Endpoint Protection is our lightest and the strongest endpoint protection on the market.
System Requirements
System Requirements
Client Workstation and Server System Requirements
Windows Operating Systems
Windows Vista (32-bit, 64-bit)
Windows 7 (32-bit, 64-bit, RTM and SP1)
Windows 7 Embedded Standard
Windows 8 (32-bit, 64-bit)
Windows 8 Embedded (32 bit)
Windows 8.1
Windows 10**
Windows Server 2003 (32-bit, 64-bit, R2 or SP1 or later)
Windows Server 2008 (32-bit, 64-bit, including R2)
Windows Server 2012 (64-bit, including R2)
Windows Small Business Server 2011 (64-bit)
Windows Essential Business Server 2008 (64-bit)
Windows Server 2016
Macintosh Operating Systems
Mac OS X 10.9, 10.10, 10.11, Mac OS 10.12
Linux Operating Systems (32-bit and 64-bit versions)
Red Hat Enterprise Linux
SuSE Linux Enterprise (server/desktop)
Novell Open Enterprise Server
Oracle Linux
CentOS
Ubuntu
Debian
Fedora
Virtual Environments
Windows Azure
Amazon WorkSpaces
VMware WS 5.0, GSX 3.2, ESX 2.5 or later
VMWare ESXi 4.1 – 5.5
VMware ESX 6.0
Microsoft Virtual Server 2005
Microsoft Enterprise Desktop Virtualization (MED-V)
Microsoft Windows Server 2008, 2012, and 2012 R2 Hyper-V
Citrix XenServer 5.6 or later
Virtual Box by Oracle
Hardware Requirements
1GHz CPU or higher
512 MB of RAM (1 GB recommended)
1.5 GB of free space on the hard disk
Mac Hardware Requirements
64 – Bit Intel Core 2 Duo or later
2 GB of RAM
500 MB of free space on the hard disk
Linux Hardware Requirements
Intel Pentium 4 (2 GHz CPU or higher)
1 GB of RAM
7 GB of free space on the hard disk